LLMs vulnerable to prompt injection attacks
As we've already seen today AI systems are becoming increasingly popular targets for attack.
New research from Snyk and Lakera looks at the risks to AI agents and LLMs from prompt injection attacks.
Save $31.99! Get 'Microsoft 365 and SharePoint Online Cookbook' for FREE
Microsoft 365 offers tools for content management, communication, process automation, and report creation. Microsoft 365 and SharePoint Online Cookbook maximizes workplace collaboration and productivity using SharePoint Online, Teams, OneDrive, Delve, M365 Search, Copilot, Power Platform, Viva, Planner, and Microsoft Forms.
You will find thoroughly updated recipes for SharePoint Online, covering sites, lists, libraries, pages, web parts, and learn SharePoint Framework (SPFx) basics for building solutions.
Resilience blueprint: Strategic steps to build operational resiliency
Globally cybersecurity is soaring to critical levels of concern for organizations. The Veeam 2023 Data Protection Report highlights that 85 percent of organizations have been hit by at least one cyber attack, illustrating the difficult journey towards recovery. The average recovery from an attack can drag on for a staggering three weeks, not only impacting operations but also carrying with it significant financial implications. Therefore, cyber resilience must adopt comprehensive strategies to ensure operational and cyber resilience. This means companies must not only take proactive cybersecurity measures to prevent disruptions but must also implement reactive measures to ensure a quick response and complete recovery in the event of a successful cyber attack.
To improve their cyber resilience and smoothly adapt to regulatory shifts, organizations must embark on a strategic journey, weaving together crucial strategies and best practices to ensure they not only survive a threat but thrive in the ever-evolving digital landscape.
Get Windows working the way YOU want with Super God Mode
You are probably familiar with God Mode in Windows. This feature displays all of the admin tools and control options on a single screen, but it’s tucked away, so you need to create a folder and give it a special name to activate it.
There are actually multiple God Modes, and we’ve covered them all, along with how to activate each one, here. However, if you're looking for something even more powerful, you should definitely try Super God Mode.
UK government wants the AI to eat your homework
The UK government has announced the launch of a new scheme that will encourage the building of new generative AI tools to help teachers when they’re planning lessons or marking homework.
This will involve the creation of a 'data store' for education data including the national curriculum, guidance for teachers, lesson plans and more. The £3m ($3.96m) data store will help tech companies build AI tools that teachers can trust to help in their work by making this data machine readable.
Publicly available GenAI development apps open to exploitation
New research from Legit Security shows that widely available GenAI development services risk sensitive information exposure, or leakage of secrets.
Legit's analysis of unprotected vector databases finds that 30 servers investigated contained corporate or private data, including company email conversations, customer PII, product serial numbers, financial records, resumes, and contact information.
The path of least resistance to Privileged Access Management
Privileged Access Management (PAM) has been around for more than 20 years taking critical accounts and putting them into a vault to ensure only select individuals could access them securely. Since then, PAM has evolved and now focuses on controlling the access itself which means preventing broad access to specific data and providing insight into who has access, and when an account has been accessed.
Privileged accounts have traditionally been given to administrators to access critical data and applications. However, changing business practices, agile software development, and digital transformation have meant that privileged accounts have become more numerous and widespread. To reduce the risk of privileged accounts being hijacked or fraudulently used, and to uphold stringent regulatory compliance within an organization, an adequate PAM solution is essential.
The critical gap in zero trust [Q&A]
As network boundaries can no longer be relied on to define the limits of cybersecurity, zero trust has become the overarching framework that now guides enterprise security strategies.
However, Zero Trust Network Access (ZTNA) has its limitations, especially in application security, and this can open up risk for organizations heavily reliant on SaaS systems.
Microsoft releases KB5041587 update for Windows 11, improving Windows Share, Narrator and Voice Access, but failing to address Linux dual boot issues
Microsoft has a released a preview of next month's update for Windows 11. The release of the KB5041587 update introduces the ability to share content to an Android device from the Windows Share window assuming the handset has been paired with Windows 11.
For some users there are security improvements to the Widgets Board, while everyone is getting updated and improved Voice Access and Narrator features. What the release fails to do, however, is fix the problems users started to face with dual-booting Linux after installing the August security updates.
CrowdStrike integrates Falcon cybersecurity with NVIDIA NIM Agent Blueprints to support secure generative AI development
CrowdStrike has announced its integration of the Falcon cybersecurity platform with NVIDIA NIM Agent Blueprints, aimed at helping developers securely utilize open-source foundational models and accelerate generative AI innovation.
Developing enterprise-grade generative AI applications involves a complex process that requires blueprints for standard workflows—such as customer service chatbots, retrieval-augmented generation, and drug discovery—to streamline development. Ensuring the security of these models and the underlying data is essential for maintaining the performance and integrity of generative AI applications.
Microsoft transitions Mono project stewardship to WineHQ organization
The Mono Project, a key component of the .NET ecosystem since its start in 2001, is undergoing a transition. Originally created to allow developers to easily build cross-platform applications, Mono has been instrumental in extending .NET to various operating systems, including Android, iOS, and Linux.
After Microsoft acquired Xamarin in 2016, it became the steward of the Mono Project, continuing its development. The last major release of the original Mono Project occurred in July 2019, with only minor patch releases since, the most recent in February 2024.
Dump Microsoft Windows 11 now and supercharge your PC with 4MLinux 46.0
If you're still using Microsoft Windows 11, it might be time to consider a switch. The newly released 4MLinux 46.0 (download here) offers a lightweight and powerful alternative that can make your computing experience smoother and more efficient.
Switching from Windows 11 to 4MLinux can be a great idea for several reasons. First, 4MLinux is known for being much lighter on system resources compared to Windows 11. This means you can get more performance out of older hardware, and even on newer machines, the system feels snappy and responsive without the usual bloat. This efficiency leads to faster boot times, quicker application launches, and an overall more responsive computing experience.
What does cybersecurity tool sprawl look like today?
Cybersecurity has become an increasingly important concern in the business world. After all, reports have found that 41 percent of businesses fell victim to a cyberattack in 2023. As the technology cyber attackers use to conduct their nefarious activities becomes more complex, so is the technology that IT professionals use to protect organizations and their data. However, with this also comes a unique new challenge: tool sprawl.
Tool sprawl occurs when a company utilizes an unnecessary number of IT tools, usually because it implements separate solutions for each use case. Although it may seem most efficient to address needs as they arise or present themselves, adopting a comprehensive approach is often more efficient -- particularly in a case where proactivity is vital, such as cybersecurity.
Remembering the human factor in AI -- Why businesses should focus on workflows, not just applications
An Office for National Statistics (ONS) report shows that one in three UK workers now believe AI could take their job. This concern has been intensified by narratives that overlook AI’s success in collaborating with humans. In reality, the most effective AI applications have been those that serve as assistants to employees, enhancing their role and maximizing their productivity, rather than replacing them.
Businesses undoubtedly understand the potential AI has to boost the productivity of employees, with more than three in every four organizations either using or exploring the use of AI. However, employers are equally unaware of the complexity of their employees’ workflows. A recent WalkMe report shows that enterprise leaders believe their business is using an average of 21 applications each week. The true number is 211, with more than 20 percent of those being AI applications.
Lexar PLAY 2280 PCIe 4.0 SSD offers up to 8TB capacity for PC and PlayStation 5 gamers
Lexar has introduced its newest storage solution for gaming enthusiasts: the PLAY 2280 PCIe Gen 4.0 SSD. Engineered to deliver outstanding performance, this SSD boasts read speeds up to 7400MB/s and write speeds up to 6500MB/s, catering to the demands of hardcore gamers who require reduced load times and seamless gameplay experiences.
The PLAY 2280 SSD is designed to enhance the PlayStation 5 (PS5) experience. It has been rigorously tested and approved for the console, providing gamers with additional storage space that allows them to play directly from the drive without needing to transfer or delete files. The included heatsink, optimized specifically for the PS5, ensures that the console can maintain its peak performance and power efficiency, even during intense gaming sessions.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.